MIHAI, I.C. (2013). Comparative Study between Traditional Security and Survivability. International Journal of Information Security and Cybercrime, 2(1), 35-42. Retrieve from https://www.ijisc.comMIHAI, I.C., 2013. Comparative Study between Traditional Security and Survivability. International Journal of Information Security and Cybercrime 2(1), 35-42. Available from: https://www.ijisc.comI.C. MIHAI, "Comparative Study between Traditional Security and Survivability," International Journal of Information Security and Cybercrime, vol. 2, no. 1, pp. 35-42, 2013. Available: https://www.ijisc.comMIHAI, I.C., 'Comparative Study between Traditional Security and Survivability', International Journal of Information Security and Cybercrime, vol. 2, no. 1, 35-42, (2013).MIHAI, I.C.: Comparative Study between Traditional Security and Survivability. International Journal of Information Security and Cybercrime 2 (2013) 35-42. https://www.ijisc.comMIHAI, I.C., (2013), Comparative Study between Traditional Security and Survivability. International Journal of Information Security and Cybercrime, 2: 35-42. https://www.ijisc.com Citation Format :
ISAC, B. (2013). Issues and Challenges in Cloud Computing Architectures. International Journal of Information Security and Cybercrime, 2(2), 35-42. Retrieve from https://www.ijisc.comISAC, B., 2013. Issues and Challenges in Cloud Computing Architectures. International Journal of Information Security and Cybercrime 2(2), 35-42. Available from: https://www.ijisc.comB. ISAC, "Issues and Challenges in Cloud Computing Architectures," International Journal of Information Security and Cybercrime, vol. 2, no. 2, pp. 35-42, 2013. Available: https://www.ijisc.comISAC, B., 'Issues and Challenges in Cloud Computing Architectures', International Journal of Information Security and Cybercrime, vol. 2, no. 2, 35-42, (2013).ISAC, B.: Issues and Challenges in Cloud Computing Architectures. International Journal of Information Security and Cybercrime 2 (2013) 35-42. https://www.ijisc.comISAC, B., (2013), Issues and Challenges in Cloud Computing Architectures. International Journal of Information Security and Cybercrime, 2: 35-42. https://www.ijisc.com Citation Format :
ALEXANDRU, A.C. (2016). Information Security Aspects of Business Continuity Management. International Journal of Information Security and Cybercrime, 5(2), 17-24. Retrieve from https://www.ijisc.comALEXANDRU, A.C., 2016. Information Security Aspects of Business Continuity Management. International Journal of Information Security and Cybercrime 5(2), 17-24. Available from: https://www.ijisc.comA.C. ALEXANDRU, "Information Security Aspects of Business Continuity Management," International Journal of Information Security and Cybercrime, vol. 5, no. 2, pp. 17-24, 2016. Available: https://www.ijisc.comALEXANDRU, A.C., 'Information Security Aspects of Business Continuity Management', International Journal of Information Security and Cybercrime, vol. 5, no. 2, 17-24, (2016).ALEXANDRU, A.C.: Information Security Aspects of Business Continuity Management. International Journal of Information Security and Cybercrime 5 (2016) 17-24. https://www.ijisc.comALEXANDRU, A.C., (2016), Information Security Aspects of Business Continuity Management. International Journal of Information Security and Cybercrime, 5: 17-24. https://www.ijisc.com Citation Format :
ŞCHEAU, M.C. (2017). Strategic Management of Critical Infrastructures and Financial Domain. International Journal of Information Security and Cybercrime, 6(1), 13-24. Retrieve from https://www.ijisc.comŞCHEAU, M.C., 2017. Strategic Management of Critical Infrastructures and Financial Domain. International Journal of Information Security and Cybercrime 6(1), 13-24. Available from: https://www.ijisc.comM.C. ŞCHEAU, "Strategic Management of Critical Infrastructures and Financial Domain," International Journal of Information Security and Cybercrime, vol. 6, no. 1, pp. 13-24, 2017. Available: https://www.ijisc.comŞCHEAU, M.C., 'Strategic Management of Critical Infrastructures and Financial Domain', International Journal of Information Security and Cybercrime, vol. 6, no. 1, 13-24, (2017).ŞCHEAU, M.C.: Strategic Management of Critical Infrastructures and Financial Domain. International Journal of Information Security and Cybercrime 6 (2017) 13-24. https://www.ijisc.comŞCHEAU, M.C., (2017), Strategic Management of Critical Infrastructures and Financial Domain. International Journal of Information Security and Cybercrime, 6: 13-24. https://www.ijisc.com Citation Format :
PRICOPE, R. (2017). Hardware and Software Technologies used in the Financial Industry. International Journal of Information Security and Cybercrime, 6(1), 33-40. Retrieve from https://www.ijisc.comPRICOPE, R., 2017. Hardware and Software Technologies used in the Financial Industry. International Journal of Information Security and Cybercrime 6(1), 33-40. Available from: https://www.ijisc.comR. PRICOPE, "Hardware and Software Technologies used in the Financial Industry," International Journal of Information Security and Cybercrime, vol. 6, no. 1, pp. 33-40, 2017. Available: https://www.ijisc.comPRICOPE, R., 'Hardware and Software Technologies used in the Financial Industry', International Journal of Information Security and Cybercrime, vol. 6, no. 1, 33-40, (2017).PRICOPE, R.: Hardware and Software Technologies used in the Financial Industry. International Journal of Information Security and Cybercrime 6 (2017) 33-40. https://www.ijisc.comPRICOPE, R., (2017), Hardware and Software Technologies used in the Financial Industry. International Journal of Information Security and Cybercrime, 6: 33-40. https://www.ijisc.com Citation Format :
COMAN, I.M. (2018). Technology as Competitive Advantage in Intelligence and Facilitator of Security Cooperation. International Journal of Information Security and Cybercrime, 7(1), 32-36. Retrieve from https://www.ijisc.comCOMAN, I.M., 2018. Technology as Competitive Advantage in Intelligence and Facilitator of Security Cooperation. International Journal of Information Security and Cybercrime 7(1), 32-36. Available from: https://www.ijisc.comI.M. COMAN, "Technology as Competitive Advantage in Intelligence and Facilitator of Security Cooperation," International Journal of Information Security and Cybercrime, vol. 7, no. 1, pp. 32-36, 2018. Available: https://www.ijisc.comCOMAN, I.M., 'Technology as Competitive Advantage in Intelligence and Facilitator of Security Cooperation', International Journal of Information Security and Cybercrime, vol. 7, no. 1, 32-36, (2018).COMAN, I.M.: Technology as Competitive Advantage in Intelligence and Facilitator of Security Cooperation. International Journal of Information Security and Cybercrime 7 (2018) 32-36. https://www.ijisc.comCOMAN, I.M., (2018), Technology as Competitive Advantage in Intelligence and Facilitator of Security Cooperation. International Journal of Information Security and Cybercrime, 7: 32-36. https://www.ijisc.com Citation Format :